12
views
0
recommends
+1 Recommend
2 collections
    0
    shares

      Submit your digital health research with an established publisher
      - celebrating 25 years of open access

      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Peer Review of “Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach”

      reviewer-report

      Read this article at

      ScienceOpenPublisherPMC
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references1

          • Record: found
          • Abstract: found
          • Article: found
          Is Open Access

          Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach

          Background Cyber defense is reactive and slow. On average, the time-to-remedy is hundreds of times larger than the time-to-compromise. In response, Human Digital Twins (HDTs) offer the capability of running massive simulations across multiple domains on the Metaverse. Simulated results may predict adversaries' behaviors and tactics, leading to more proactive cyber defense strategies. However, current HDTs’ cognitive architectures are underdeveloped for such use. Objective This paper aims to make a case for extending the current digital cognitive architectures as the first step toward more robust HDTs that are suitable for realistic Metaverse cybersecurity simulations. Methods This study formally documented 108 psychology constructs and thousands of related paths based on 20 time-tested psychology theories, all of which were packaged as Cybonto—a novel ontology. Then, this study applied 20 network science centrality algorithms in ranking the Cybonto psychology constructs by their influences. Results Out of 108 psychology constructs, the top 10 are Behavior, Arousal, Goals, Perception, Self-efficacy, Circumstances, Evaluating, Behavior-Controllability, Knowledge, and Intentional Modality. In this list, only Behaviors, Goals, Perception, Evaluating, and Knowledge are parts of existing digital cognitive architectures. Notably, some of the constructs are not explicitly implemented. Early usability tests demonstrate that Cybonto can also be useful for immediate uses such as manual analysis of hackers’ behaviors and automatic analysis of behavioral cybersecurity knowledge texts. Conclusions The results call for specific extensions of current digital cognitive architectures such as explicitly implementing more refined structures of Long-term Memory and Perception, placing a stronger focus on noncognitive yet influential constructs such as Arousal, and creating new capabilities for simulating, reasoning about, and selecting circumstances.

            Author and article information

            Journal
            JMIRx Med
            JMIRx Med
            JMIRxMed
            JMIRx Med
            JMIR Publications (Toronto, Canada )
            2563-6316
            Apr-Jun 2022
            20 April 2022
            : 3
            : 2
            : e38581
            Affiliations
            [1 ] Central University of Technology Bloemfontein South Africa
            Author information
            https://orcid.org/0000-0001-5165-5443
            Article
            v3i2e38581
            10.2196/38581
            10414309
            8c99ad7d-2215-4716-b817-66945aec29df
            ©Daniel Ayo Oladele. Originally published in JMIRx Med (https://med.jmirx.org), 20.04.2022.

            This is an open-access article distributed under the terms of the Creative Commons Attribution License ( https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIRx Med, is properly cited. The complete bibliographic information, a link to the original publication on https://med.jmirx.org/, as well as this copyright and license information must be included.

            History
            : 7 April 2022
            : 7 April 2022
            Categories
            Peer-Review Report
            Peer-Review Report

            human behavior modeling,cognitive twins,human digital twins,cybersecurity,cognitive systems,digital twins,metaverse,artificial intelligence

            Comments

            Comment on this article

            Related Documents Log